Improving return on investment should be a top priority for communication service providers (CSPs) in their marketing campaigns. Yet in many cases, even though these companies have a wealth of information available about their customers, they aren’t using this effectively to deliver better, more personalized messaging. As a result, many campaigns are too generic or […]
Did someone say ‘breach’?!
Hackers in pursuit of valuable customer data breach T-Mobile servers.
T-Mobile confirmed that hackers breached their servers on Monday, Aug 16, which preceded a formal statement the following day. They estimate that over 40 million people had their data compromised in the breach. This includes PII such as social security numbers, date of birth, names, driver license information, and more. And sadly, no, this is not the first time their data has been compromised.
Utter the words ‘data breach’, and the news spreads just as fast as any 5G network. Over the past 10 years, there have been 300 data breaches involving the theft of 100,000 or more records according to Forbes. And per the World Economic Forum, as of 2019, cyber-attacks are considered among the top five risks to global stability. Sadly, this news isn’t new. But considering that most of the individuals affected by the T-Mobile breach weren’t even existing customers, the headline doesn’t evoke much confidence.
Cyber security threats and mistakes can come to life at five key levels: the machine level, the data level, the network level, the Internet level, and first and foremost – the human level. There are prevention measures that can be put in place across all five – the key is to ensure there’s consistency on ongoing audit and data strategies especially when it comes to protecting your CRM while using it for analysis.
The risk appetite that we practice at Intent HQ is As Low As Reasonably Practicable (ALARP). We know how valuable your customer data is in producing powerful insights and actionable audiences – we also know how dangerous it is when proven vulnerable. We offer Service Providers an opportunity to realize the value of their data and monetize it in a manner that protects the rights of the individual subscribers and complies with any privacy or security legislation.
For questions and more information on IHQ privacy standards, please don’t hesitate to reach out.